@drunk-pulumi/azure-components 0.0.6

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (181) hide show
  1. package/PulumiPlugin.yaml +1 -0
  2. package/README.md +1 -0
  3. package/ResourceBuilder.d.ts +54 -0
  4. package/ResourceBuilder.js +71 -0
  5. package/aks/AzKubernetes.d.ts +55 -0
  6. package/aks/AzKubernetes.js +288 -0
  7. package/aks/ContainerRegistry.d.ts +19 -0
  8. package/aks/ContainerRegistry.js +119 -0
  9. package/aks/helpers.d.ts +6 -0
  10. package/aks/helpers.js +52 -0
  11. package/aks/index.d.ts +3 -0
  12. package/aks/index.js +43 -0
  13. package/app/AppCert.d.ts +15 -0
  14. package/app/AppCert.js +74 -0
  15. package/app/AppConfig.d.ts +18 -0
  16. package/app/AppConfig.js +124 -0
  17. package/app/AppService.d.ts +69 -0
  18. package/app/AppService.js +122 -0
  19. package/app/IoTHub.d.ts +15 -0
  20. package/app/IoTHub.js +80 -0
  21. package/app/LogicApp.d.ts +19 -0
  22. package/app/LogicApp.js +77 -0
  23. package/app/SignalR.d.ts +45 -0
  24. package/app/SignalR.js +125 -0
  25. package/app/index.d.ts +6 -0
  26. package/app/index.js +23 -0
  27. package/azAd/AppRegistration.d.ts +52 -0
  28. package/azAd/AppRegistration.js +165 -0
  29. package/azAd/AzRole.d.ts +14 -0
  30. package/azAd/AzRole.js +72 -0
  31. package/azAd/CustomRoles.d.ts +10 -0
  32. package/azAd/CustomRoles.js +73 -0
  33. package/azAd/GroupRole.d.ts +29 -0
  34. package/azAd/GroupRole.js +107 -0
  35. package/azAd/RoleAssignment.d.ts +15 -0
  36. package/azAd/RoleAssignment.js +63 -0
  37. package/azAd/UserAssignedIdentity.d.ts +17 -0
  38. package/azAd/UserAssignedIdentity.js +76 -0
  39. package/azAd/helpers/graphBuiltIn.d.ts +14 -0
  40. package/azAd/helpers/graphBuiltIn.js +5134 -0
  41. package/azAd/helpers/index.d.ts +3 -0
  42. package/azAd/helpers/index.js +39 -0
  43. package/azAd/helpers/rolesBuiltIn.d.ts +90 -0
  44. package/azAd/helpers/rolesBuiltIn.js +18601 -0
  45. package/azAd/helpers/rsRoleDefinition.d.ts +62 -0
  46. package/azAd/helpers/rsRoleDefinition.js +120 -0
  47. package/azAd/index.d.ts +7 -0
  48. package/azAd/index.js +24 -0
  49. package/base/BaseComponent.d.ts +53 -0
  50. package/base/BaseComponent.js +98 -0
  51. package/base/BaseResourceComponent.d.ts +108 -0
  52. package/base/BaseResourceComponent.js +180 -0
  53. package/base/helpers.d.ts +12 -0
  54. package/base/helpers.js +29 -0
  55. package/base/index.d.ts +3 -0
  56. package/base/index.js +43 -0
  57. package/common/PGPGenerator.d.ts +26 -0
  58. package/common/PGPGenerator.js +72 -0
  59. package/common/RandomPassword.d.ts +21 -0
  60. package/common/RandomPassword.js +84 -0
  61. package/common/RandomString.d.ts +20 -0
  62. package/common/RandomString.js +74 -0
  63. package/common/ResourceLocker.d.ts +9 -0
  64. package/common/ResourceLocker.js +52 -0
  65. package/common/RsGroup.d.ts +20 -0
  66. package/common/RsGroup.js +85 -0
  67. package/common/SshGenerator.d.ts +17 -0
  68. package/common/SshGenerator.js +66 -0
  69. package/common/index.d.ts +5 -0
  70. package/common/index.js +22 -0
  71. package/database/AzSql.d.ts +71 -0
  72. package/database/AzSql.js +283 -0
  73. package/database/MySql.d.ts +35 -0
  74. package/database/MySql.js +181 -0
  75. package/database/Postgres.d.ts +32 -0
  76. package/database/Postgres.js +171 -0
  77. package/database/Redis.d.ts +26 -0
  78. package/database/Redis.js +125 -0
  79. package/database/helpers.d.ts +7 -0
  80. package/database/helpers.js +52 -0
  81. package/database/index.d.ts +5 -0
  82. package/database/index.js +45 -0
  83. package/helpers/Location/LocationBuiltIn.d.ts +6 -0
  84. package/helpers/Location/LocationBuiltIn.js +493 -0
  85. package/helpers/Location/index.d.ts +3 -0
  86. package/helpers/Location/index.js +25 -0
  87. package/helpers/autoTags.d.ts +1 -0
  88. package/helpers/autoTags.js +27 -0
  89. package/helpers/azureEnv.d.ts +21 -0
  90. package/helpers/azureEnv.js +102 -0
  91. package/helpers/configHelper.d.ts +5 -0
  92. package/helpers/configHelper.js +54 -0
  93. package/helpers/index.d.ts +4 -0
  94. package/helpers/index.js +41 -0
  95. package/helpers/rsHelpers.d.ts +18 -0
  96. package/helpers/rsHelpers.js +92 -0
  97. package/helpers/stackEnv.d.ts +4 -0
  98. package/helpers/stackEnv.js +54 -0
  99. package/index.d.ts +14 -0
  100. package/index.js +53 -0
  101. package/logs/Logs.d.ts +48 -0
  102. package/logs/Logs.js +154 -0
  103. package/logs/helpers.d.ts +1 -0
  104. package/logs/helpers.js +38 -0
  105. package/logs/index.d.ts +1 -0
  106. package/logs/index.js +18 -0
  107. package/package.json +34 -0
  108. package/services/Automation.d.ts +16 -0
  109. package/services/Automation.js +85 -0
  110. package/services/AzSearch.d.ts +20 -0
  111. package/services/AzSearch.js +113 -0
  112. package/services/ServiceBus.d.ts +42 -0
  113. package/services/ServiceBus.js +256 -0
  114. package/services/index.d.ts +3 -0
  115. package/services/index.js +20 -0
  116. package/storage/StorageAccount.d.ts +53 -0
  117. package/storage/StorageAccount.js +261 -0
  118. package/storage/helpers.d.ts +24 -0
  119. package/storage/helpers.js +89 -0
  120. package/storage/index.d.ts +2 -0
  121. package/storage/index.js +42 -0
  122. package/types.d.ts +125 -0
  123. package/types.js +3 -0
  124. package/vault/EncryptionKey.d.ts +21 -0
  125. package/vault/EncryptionKey.js +73 -0
  126. package/vault/KeyVault.d.ts +31 -0
  127. package/vault/KeyVault.js +110 -0
  128. package/vault/VaultSecret.d.ts +23 -0
  129. package/vault/VaultSecret.js +72 -0
  130. package/vault/VaultSecrets.d.ts +25 -0
  131. package/vault/VaultSecrets.js +31 -0
  132. package/vault/helpers.d.ts +1 -0
  133. package/vault/helpers.js +13 -0
  134. package/vault/index.d.ts +5 -0
  135. package/vault/index.js +45 -0
  136. package/vm/DiskEncryptionSet.d.ts +16 -0
  137. package/vm/DiskEncryptionSet.js +74 -0
  138. package/vm/VirtualMachine.d.ts +45 -0
  139. package/vm/VirtualMachine.js +192 -0
  140. package/vm/helpers.d.ts +16 -0
  141. package/vm/helpers.js +15 -0
  142. package/vm/index.d.ts +3 -0
  143. package/vm/index.js +43 -0
  144. package/vnet/AzCdn.d.ts +44 -0
  145. package/vnet/AzCdn.js +276 -0
  146. package/vnet/Basion.d.ts +19 -0
  147. package/vnet/Basion.js +78 -0
  148. package/vnet/DnsZone.d.ts +36 -0
  149. package/vnet/DnsZone.js +113 -0
  150. package/vnet/Firewall.d.ts +53 -0
  151. package/vnet/Firewall.js +136 -0
  152. package/vnet/FirewallPolicies/FirewallPolicyBuilder.d.ts +18 -0
  153. package/vnet/FirewallPolicies/FirewallPolicyBuilder.js +91 -0
  154. package/vnet/FirewallPolicies/commonPolicies.d.ts +10 -0
  155. package/vnet/FirewallPolicies/commonPolicies.js +55 -0
  156. package/vnet/FirewallPolicies/index.d.ts +0 -0
  157. package/vnet/FirewallPolicies/index.js +2 -0
  158. package/vnet/IpAddresses.d.ts +36 -0
  159. package/vnet/IpAddresses.js +74 -0
  160. package/vnet/NetworkPeering.d.ts +21 -0
  161. package/vnet/NetworkPeering.js +85 -0
  162. package/vnet/PrivateDnsZone.d.ts +38 -0
  163. package/vnet/PrivateDnsZone.js +111 -0
  164. package/vnet/PrivateEndpoint.d.ts +43 -0
  165. package/vnet/PrivateEndpoint.js +181 -0
  166. package/vnet/RouteTable.d.ts +22 -0
  167. package/vnet/RouteTable.js +75 -0
  168. package/vnet/VirtualNetwork.d.ts +99 -0
  169. package/vnet/VirtualNetwork.js +311 -0
  170. package/vnet/VpnGateway.d.ts +18 -0
  171. package/vnet/VpnGateway.js +90 -0
  172. package/vnet/helpers.d.ts +16 -0
  173. package/vnet/helpers.js +47 -0
  174. package/vnet/index.d.ts +13 -0
  175. package/vnet/index.js +53 -0
  176. package/vnet/securityRules/SecurityRuleBuilder.d.ts +12 -0
  177. package/vnet/securityRules/SecurityRuleBuilder.js +55 -0
  178. package/vnet/securityRules/commonRules.d.ts +9 -0
  179. package/vnet/securityRules/commonRules.js +94 -0
  180. package/vnet/securityRules/index.d.ts +2 -0
  181. package/vnet/securityRules/index.js +19 -0
@@ -0,0 +1,66 @@
1
+ "use strict";
2
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
+ if (k2 === undefined) k2 = k;
4
+ var desc = Object.getOwnPropertyDescriptor(m, k);
5
+ if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
+ desc = { enumerable: true, get: function() { return m[k]; } };
7
+ }
8
+ Object.defineProperty(o, k2, desc);
9
+ }) : (function(o, m, k, k2) {
10
+ if (k2 === undefined) k2 = k;
11
+ o[k2] = m[k];
12
+ }));
13
+ var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
14
+ Object.defineProperty(o, "default", { enumerable: true, value: v });
15
+ }) : function(o, v) {
16
+ o["default"] = v;
17
+ });
18
+ var __importStar = (this && this.__importStar) || (function () {
19
+ var ownKeys = function(o) {
20
+ ownKeys = Object.getOwnPropertyNames || function (o) {
21
+ var ar = [];
22
+ for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k;
23
+ return ar;
24
+ };
25
+ return ownKeys(o);
26
+ };
27
+ return function (mod) {
28
+ if (mod && mod.__esModule) return mod;
29
+ var result = {};
30
+ if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== "default") __createBinding(result, mod, k[i]);
31
+ __setModuleDefault(result, mod);
32
+ return result;
33
+ };
34
+ })();
35
+ Object.defineProperty(exports, "__esModule", { value: true });
36
+ exports.SshGenerator = void 0;
37
+ const azure_providers_1 = require("@drunk-pulumi/azure-providers");
38
+ const pulumi = __importStar(require("@pulumi/pulumi"));
39
+ const base_1 = require("../base");
40
+ class SshGenerator extends base_1.BaseResourceComponent {
41
+ publicKey;
42
+ privateKey;
43
+ password;
44
+ constructor(name, args, opts) {
45
+ super('SshGenerator', name, args, opts);
46
+ const ssh = new azure_providers_1.SshKeyResource(name, args, { ...opts, parent: this });
47
+ this.publicKey = ssh.publicKey;
48
+ this.privateKey = ssh.privateKey;
49
+ this.password = pulumi.secret(args.password);
50
+ this.addSecrets({
51
+ publicKey: ssh.publicKey,
52
+ privateKey: ssh.privateKey,
53
+ password: args.password,
54
+ });
55
+ this.registerOutputs();
56
+ }
57
+ getOutputs() {
58
+ return {
59
+ publicKey: this.publicKey,
60
+ privateKey: this.privateKey,
61
+ password: this.password,
62
+ };
63
+ }
64
+ }
65
+ exports.SshGenerator = SshGenerator;
66
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1,5 @@
1
+ export * from './PGPGenerator';
2
+ export * from './RandomPassword';
3
+ export * from './RandomString';
4
+ export * from './RsGroup';
5
+ export * from './SshGenerator';
@@ -0,0 +1,22 @@
1
+ "use strict";
2
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
+ if (k2 === undefined) k2 = k;
4
+ var desc = Object.getOwnPropertyDescriptor(m, k);
5
+ if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
+ desc = { enumerable: true, get: function() { return m[k]; } };
7
+ }
8
+ Object.defineProperty(o, k2, desc);
9
+ }) : (function(o, m, k, k2) {
10
+ if (k2 === undefined) k2 = k;
11
+ o[k2] = m[k];
12
+ }));
13
+ var __exportStar = (this && this.__exportStar) || function(m, exports) {
14
+ for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
15
+ };
16
+ Object.defineProperty(exports, "__esModule", { value: true });
17
+ __exportStar(require("./PGPGenerator"), exports);
18
+ __exportStar(require("./RandomPassword"), exports);
19
+ __exportStar(require("./RandomString"), exports);
20
+ __exportStar(require("./RsGroup"), exports);
21
+ __exportStar(require("./SshGenerator"), exports);
22
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi9zcmMvY29tbW9uL2luZGV4LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7Ozs7Ozs7Ozs7Ozs7Ozs7QUFBQSxpREFBK0I7QUFDL0IsbURBQWlDO0FBQ2pDLGlEQUErQjtBQUMvQiw0Q0FBMEI7QUFDMUIsaURBQStCIn0=
@@ -0,0 +1,71 @@
1
+ import * as sql from '@pulumi/azure-native/sql';
2
+ import * as pulumi from '@pulumi/pulumi';
3
+ import { BaseArgs, BaseResourceComponent } from '../base/BaseResourceComponent';
4
+ import * as types from '../types';
5
+ export type AzSqlSkuType = {
6
+ /**
7
+ * Capacity of the particular SKU.
8
+ */
9
+ capacity?: 0 | 50 | 100 | 200 | 300 | 400 | 800 | 1200 | number;
10
+ /**
11
+ * If the service has different generations of hardware, for the same SKU, then that can be captured here.
12
+ */
13
+ family?: pulumi.Input<string>;
14
+ /**
15
+ * The name of the SKU, typically, a letter + Number code, e.g. P3.
16
+ */
17
+ name: pulumi.Input<string>;
18
+ /**
19
+ * Size of the particular SKU
20
+ */
21
+ size?: pulumi.Input<string>;
22
+ /**
23
+ * The tier or edition of the particular SKU, e.g. Basic, Premium.
24
+ */
25
+ tier?: 'Standard' | 'Basic';
26
+ };
27
+ export interface AzSqlArgs extends BaseArgs, types.WithEncryptionEnabler, types.WithResourceGroupInputs, types.WithGroupRolesArgs, types.WithUserAssignedIdentity, Pick<sql.ServerArgs, 'administratorLogin' | 'federatedClientId' | 'isIPv6Enabled' | 'restrictOutboundNetworkAccess' | 'version'> {
28
+ administrators?: {
29
+ azureAdOnlyAuthentication?: boolean;
30
+ useDefaultUAssignedIdForConnection?: boolean;
31
+ adminGroup: {
32
+ displayName: pulumi.Input<string>;
33
+ objectId: pulumi.Input<string>;
34
+ };
35
+ };
36
+ elasticPool?: Pick<sql.ElasticPoolArgs, 'autoPauseDelay' | 'availabilityZone' | 'highAvailabilityReplicaCount' | 'licenseType' | 'perDatabaseSettings'> & {
37
+ maxSizeGB?: number;
38
+ sku: AzSqlSkuType;
39
+ };
40
+ network?: Omit<types.NetworkArgs, 'bypass' | 'defaultAction' | 'vnetRules'> & {
41
+ acceptAllPublicConnection?: boolean;
42
+ subnets?: pulumi.Input<Array<{
43
+ id: string;
44
+ }>>;
45
+ };
46
+ vulnerabilityAssessment?: {
47
+ logStorage: types.ResourceWithGroupInputs;
48
+ alertEmails: pulumi.Input<string[]>;
49
+ retentionDays?: number;
50
+ };
51
+ lock?: boolean;
52
+ databases?: Record<string, Omit<sql.DatabaseArgs, 'resourceGroupName' | 'serverName' | 'elasticPoolId' | 'encryptionProtector' | 'encryptionProtectorAutoRotation' | 'federatedClientId' | 'preferredEnclaveType' | 'sku'> & {
53
+ /** sample: sku: { name: 'Basic', tier: 'Basic', capacity: 0 } */
54
+ sku?: AzSqlSkuType;
55
+ }>;
56
+ }
57
+ export declare class AzSql extends BaseResourceComponent<AzSqlArgs> {
58
+ readonly id: pulumi.Output<string>;
59
+ readonly resourceName: pulumi.Output<string>;
60
+ constructor(name: string, args: AzSqlArgs, opts?: pulumi.ComponentResourceOptions);
61
+ getOutputs(): {
62
+ id: pulumi.Output<string>;
63
+ resourceName: pulumi.Output<string>;
64
+ };
65
+ private createSql;
66
+ private createNetwork;
67
+ private createElasticPool;
68
+ private createEncryptionProtector;
69
+ private createVulnerabilityAssessment;
70
+ private createDatabases;
71
+ }
@@ -0,0 +1,283 @@
1
+ "use strict";
2
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
+ if (k2 === undefined) k2 = k;
4
+ var desc = Object.getOwnPropertyDescriptor(m, k);
5
+ if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
+ desc = { enumerable: true, get: function() { return m[k]; } };
7
+ }
8
+ Object.defineProperty(o, k2, desc);
9
+ }) : (function(o, m, k, k2) {
10
+ if (k2 === undefined) k2 = k;
11
+ o[k2] = m[k];
12
+ }));
13
+ var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
14
+ Object.defineProperty(o, "default", { enumerable: true, value: v });
15
+ }) : function(o, v) {
16
+ o["default"] = v;
17
+ });
18
+ var __importStar = (this && this.__importStar) || (function () {
19
+ var ownKeys = function(o) {
20
+ ownKeys = Object.getOwnPropertyNames || function (o) {
21
+ var ar = [];
22
+ for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k;
23
+ return ar;
24
+ };
25
+ return ownKeys(o);
26
+ };
27
+ return function (mod) {
28
+ if (mod && mod.__esModule) return mod;
29
+ var result = {};
30
+ if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== "default") __createBinding(result, mod, k[i]);
31
+ __setModuleDefault(result, mod);
32
+ return result;
33
+ };
34
+ })();
35
+ Object.defineProperty(exports, "__esModule", { value: true });
36
+ exports.AzSql = void 0;
37
+ const sql = __importStar(require("@pulumi/azure-native/sql"));
38
+ const pulumi = __importStar(require("@pulumi/pulumi"));
39
+ const BaseResourceComponent_1 = require("../base/BaseResourceComponent");
40
+ const helpers_1 = require("../helpers");
41
+ const storage_1 = require("../storage");
42
+ const helpers_2 = require("../storage/helpers");
43
+ const vnet = __importStar(require("../vnet"));
44
+ const helpers_3 = require("./helpers");
45
+ class AzSql extends BaseResourceComponent_1.BaseResourceComponent {
46
+ id;
47
+ resourceName;
48
+ constructor(name, args, opts) {
49
+ super('AzSql', name, args, opts);
50
+ const { server, password } = this.createSql();
51
+ const elastic = this.createElasticPool(server);
52
+ this.createVulnerabilityAssessment(server);
53
+ this.createNetwork(server);
54
+ this.createDatabases(server, password, elastic);
55
+ if (args.lock)
56
+ this.lockFromDeleting(server);
57
+ this.id = server.id;
58
+ this.resourceName = server.name;
59
+ this.registerOutputs();
60
+ }
61
+ getOutputs() {
62
+ return {
63
+ id: this.id,
64
+ resourceName: this.resourceName,
65
+ };
66
+ }
67
+ createSql() {
68
+ const { rsGroup, enableEncryption, defaultUAssignedId, administrators, network, lock, administratorLogin, ...props } = this.args;
69
+ const adminLogin = administratorLogin ?? pulumi.interpolate `${this.name}-admin-${this.createRandomString().value}`;
70
+ const password = this.createPassword();
71
+ const encryptionKey = enableEncryption ? this.getEncryptionKey({ keySize: 3072 }) : undefined;
72
+ const server = new sql.Server(this.name, {
73
+ ...props,
74
+ ...rsGroup,
75
+ version: this.args.version ?? '12.0',
76
+ minimalTlsVersion: '1.2',
77
+ identity: {
78
+ type: defaultUAssignedId ? sql.IdentityType.SystemAssigned_UserAssigned : sql.IdentityType.SystemAssigned,
79
+ userAssignedIdentities: defaultUAssignedId ? [defaultUAssignedId.id] : undefined,
80
+ },
81
+ primaryUserAssignedIdentityId: defaultUAssignedId?.id,
82
+ administratorLogin: adminLogin,
83
+ administratorLoginPassword: password.value,
84
+ keyId: encryptionKey?.id,
85
+ administrators: administrators
86
+ ? {
87
+ administratorType: administrators.adminGroup?.objectId
88
+ ? sql.AdministratorType.ActiveDirectory
89
+ : undefined,
90
+ azureADOnlyAuthentication: administrators.adminGroup?.objectId
91
+ ? administrators.azureAdOnlyAuthentication ?? true
92
+ : false,
93
+ principalType: sql.PrincipalType.Group,
94
+ tenantId: helpers_1.azureEnv.tenantId,
95
+ sid: administrators.adminGroup?.objectId,
96
+ login: administrators.adminGroup?.displayName,
97
+ }
98
+ : undefined,
99
+ publicNetworkAccess: network?.privateLink
100
+ ? sql.ServerNetworkAccessFlag.Disabled
101
+ : sql.ServerNetworkAccessFlag.Enabled,
102
+ }, {
103
+ ...this.opts,
104
+ protect: lock ?? this.opts?.protect,
105
+ dependsOn: this.opts?.dependsOn ? this.opts.dependsOn : password,
106
+ parent: this,
107
+ });
108
+ this.createEncryptionProtector(server, encryptionKey);
109
+ this.addIdentityToRole('readOnly', server.identity);
110
+ return { server, password };
111
+ }
112
+ createNetwork(server) {
113
+ const { rsGroup, network } = this.args;
114
+ if (!network)
115
+ return;
116
+ //Allows Ip Addresses
117
+ if (network.acceptAllPublicConnection) {
118
+ new sql.FirewallRule(`${this.name}-allows-all-connection`, {
119
+ ...rsGroup,
120
+ //firewallRuleName: 'allows-all-connection',
121
+ serverName: server.name,
122
+ startIpAddress: '0.0.0.0',
123
+ endIpAddress: '255.255.255.255',
124
+ }, { dependsOn: server, parent: this });
125
+ }
126
+ else if (network.ipRules) {
127
+ pulumi.output(network.ipRules).apply((ips) => (0, helpers_3.convertToIpRange)(ips).map((ip, i) => {
128
+ const n = `${this.name}-fwRule-${i}`;
129
+ return new sql.FirewallRule(n, {
130
+ ...rsGroup,
131
+ //firewallRuleName: n,
132
+ serverName: server.name,
133
+ startIpAddress: ip.start,
134
+ endIpAddress: ip.end,
135
+ }, { dependsOn: server, parent: this });
136
+ }));
137
+ }
138
+ //Allows Subnets
139
+ if (network.subnets) {
140
+ pulumi.output(network.subnets).apply((subIds) => subIds.map((s) => {
141
+ const subName = vnet.vnetHelpers.getSubnetNameFromId(s.id);
142
+ new sql.VirtualNetworkRule(`${this.name}-sub-${subName}`, {
143
+ ...rsGroup,
144
+ serverName: server.name,
145
+ virtualNetworkSubnetId: s.id,
146
+ ignoreMissingVnetServiceEndpoint: false,
147
+ }, { dependsOn: server, parent: this });
148
+ }));
149
+ }
150
+ //Private Link
151
+ if (network.privateLink) {
152
+ new vnet.PrivateEndpoint(this.name, {
153
+ ...network.privateLink,
154
+ rsGroup,
155
+ type: 'sqlServer',
156
+ resourceInfo: server,
157
+ }, { dependsOn: server, parent: this });
158
+ }
159
+ }
160
+ createElasticPool(server) {
161
+ const { rsGroup, elasticPool } = this.args;
162
+ if (!elasticPool)
163
+ return undefined;
164
+ return new sql.ElasticPool(`${this.name}-elasticPool`, {
165
+ ...elasticPool,
166
+ ...rsGroup,
167
+ //autoPauseDelay: props.autoPauseDelay ?? azureEnv.isPrd ? -1 : 10,
168
+ preferredEnclaveType: sql.AlwaysEncryptedEnclaveType.VBS,
169
+ serverName: server.name,
170
+ maxSizeBytes: elasticPool.maxSizeGB ? elasticPool.maxSizeGB * 1024 * 1024 * 1024 : undefined,
171
+ }, { dependsOn: server, parent: this });
172
+ }
173
+ createEncryptionProtector(server, key) {
174
+ if (!key)
175
+ return undefined;
176
+ const { rsGroup, vaultInfo } = this.args;
177
+ // Enable a server key in the SQL Server with reference to the Key Vault Key
178
+ const keyName = pulumi.interpolate `${vaultInfo.resourceName}_${key.keyName}_${key.version}`;
179
+ //Server key maybe auto created by Azure
180
+ // const serverKey = new sql.ServerKey(
181
+ // `${sqlName}-serverKey`,
182
+ // {
183
+ // resourceGroupName: group.resourceGroupName,
184
+ // serverName: sqlName,
185
+ // serverKeyType: sql.ServerKeyType.AzureKeyVault,
186
+ // keyName,
187
+ // uri: encryptKey.url,
188
+ // },
189
+ // { dependsOn: sqlServer, retainOnDelete: true },
190
+ // );
191
+ //enable the EncryptionProtector
192
+ return new sql.EncryptionProtector(`${this.name}-encryptionProtector`, {
193
+ encryptionProtectorName: 'current',
194
+ resourceGroupName: rsGroup.resourceGroupName,
195
+ serverName: server.name,
196
+ serverKeyType: sql.ServerKeyType.AzureKeyVault,
197
+ serverKeyName: keyName, //serverKey.name,
198
+ autoRotationEnabled: true,
199
+ }, { dependsOn: server, parent: this });
200
+ }
201
+ createVulnerabilityAssessment(server) {
202
+ const { rsGroup, vulnerabilityAssessment, vaultInfo } = this.args;
203
+ if (!vulnerabilityAssessment)
204
+ return undefined;
205
+ //this will allows sql server to able to write log into the storage account
206
+ this.addIdentityToRole('contributor', server.identity);
207
+ const stgEndpoints = storage_1.storageHelpers.getStorageEndpointsOutputs(vulnerabilityAssessment.logStorage);
208
+ const storageKey = (0, helpers_2.getStorageAccessKeyOutputs)(vulnerabilityAssessment.logStorage, vaultInfo);
209
+ const alert = new sql.ServerSecurityAlertPolicy(`${this.name}-alert`, {
210
+ ...rsGroup,
211
+ securityAlertPolicyName: 'default',
212
+ serverName: server.name,
213
+ emailAccountAdmins: true,
214
+ emailAddresses: vulnerabilityAssessment.alertEmails,
215
+ retentionDays: vulnerabilityAssessment.retentionDays ?? helpers_1.azureEnv.isPrd ? 30 : 7,
216
+ storageAccountAccessKey: storageKey,
217
+ storageEndpoint: stgEndpoints.blob,
218
+ state: 'Enabled',
219
+ }, { dependsOn: server, parent: this });
220
+ //Server Audit
221
+ new sql.ExtendedServerBlobAuditingPolicy(`${this.name}-audit`, {
222
+ ...rsGroup,
223
+ auditActionsAndGroups: [
224
+ 'SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP',
225
+ 'FAILED_DATABASE_AUTHENTICATION_GROUP',
226
+ 'BATCH_COMPLETED_GROUP',
227
+ ],
228
+ serverName: server.name,
229
+ blobAuditingPolicyName: 'default',
230
+ isAzureMonitorTargetEnabled: true,
231
+ isStorageSecondaryKeyInUse: false,
232
+ predicateExpression: "object_name = 'SensitiveData'",
233
+ queueDelayMs: 4000,
234
+ retentionDays: vulnerabilityAssessment.retentionDays ?? helpers_1.azureEnv.isPrd ? 30 : 7,
235
+ state: 'Enabled',
236
+ isDevopsAuditEnabled: true,
237
+ storageAccountAccessKey: storageKey,
238
+ storageAccountSubscriptionId: helpers_1.azureEnv.subscriptionId,
239
+ storageEndpoint: stgEndpoints.blob,
240
+ }, { dependsOn: alert, parent: this });
241
+ //ServerVulnerabilityAssessment
242
+ new sql.ServerVulnerabilityAssessment(`${this.name}-assessment`, {
243
+ ...rsGroup,
244
+ vulnerabilityAssessmentName: this.name,
245
+ serverName: server.name,
246
+ recurringScans: {
247
+ isEnabled: true,
248
+ emailSubscriptionAdmins: true,
249
+ emails: vulnerabilityAssessment.alertEmails,
250
+ },
251
+ storageContainerPath: pulumi.interpolate `${stgEndpoints.blob}/${server.name}`,
252
+ storageAccountAccessKey: storageKey,
253
+ }, { dependsOn: alert, parent: this });
254
+ }
255
+ createDatabases(server, password, elasticPool) {
256
+ const { rsGroup, databases, administrators, defaultUAssignedId } = this.args;
257
+ if (!databases)
258
+ return undefined;
259
+ return Object.keys(databases).map((k) => {
260
+ const props = databases[k];
261
+ const name = props.databaseName ?? k;
262
+ const db = new sql.Database(`${this.name}-${name}`, {
263
+ ...props,
264
+ ...rsGroup,
265
+ //autoPauseDelay: props.autoPauseDelay ?? azureEnv.isPrd ? -1 : 10,
266
+ preferredEnclaveType: sql.AlwaysEncryptedEnclaveType.VBS,
267
+ elasticPoolId: elasticPool?.id,
268
+ sku: elasticPool?.id ? undefined : props.sku,
269
+ serverName: server.name,
270
+ databaseName: name,
271
+ }, { dependsOn: elasticPool ? [server, password, elasticPool] : [server, password], parent: this });
272
+ const connectionString = administrators?.azureAdOnlyAuthentication
273
+ ? administrators?.useDefaultUAssignedIdForConnection
274
+ ? pulumi.interpolate `Server=tcp:${server.name}.database.windows.net,1433; Initial Catalog=${db.name}; Authentication="Active Directory Managed Identity"; User Id=${defaultUAssignedId?.principalId}; MultipleActiveResultSets=False; Encrypt=True; TrustServerCertificate=True; Connection Timeout=120;`
275
+ : pulumi.interpolate `Server=tcp:${server.name}.database.windows.net,1433; Initial Catalog=${db.name}; Authentication="Active Directory Default"; MultipleActiveResultSets=False;Encrypt=True; TrustServerCertificate=True; Connection Timeout=120;`
276
+ : pulumi.interpolate `Server=tcp:${server.name}.database.windows.net,1433; Initial Catalog=${db.name}; User Id=${server.administratorLogin}; Password=${password.value}; MultipleActiveResultSets=False; Encrypt=True; TrustServerCertificate=True; Connection Timeout=120;`;
277
+ this.addSecret(`${name}-conn`, connectionString);
278
+ return db;
279
+ });
280
+ }
281
+ }
282
+ exports.AzSql = AzSql;
283
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"AzSql.js","sourceRoot":"","sources":["../../src/database/AzSql.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,8DAAgD;AAChD,uDAAyC;AACzC,yEAAgF;AAEhF,wCAAsC;AACtC,wCAA4C;AAC5C,gDAAgE;AAGhE,8CAAgC;AAChC,uCAA6C;AA6E7C,MAAa,KAAM,SAAQ,6CAAgC;IACzC,EAAE,CAAwB;IAC1B,YAAY,CAAwB;IAEpD,YAAY,IAAY,EAAE,IAAe,EAAE,IAAsC;QAC/E,KAAK,CAAC,OAAO,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,CAAC,CAAC;QAEjC,MAAM,EAAE,MAAM,EAAE,QAAQ,EAAE,GAAG,IAAI,CAAC,SAAS,EAAE,CAAC;QAC9C,MAAM,OAAO,GAAG,IAAI,CAAC,iBAAiB,CAAC,MAAM,CAAC,CAAC;QAE/C,IAAI,CAAC,6BAA6B,CAAC,MAAM,CAAC,CAAC;QAC3C,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,CAAC;QAC3B,IAAI,CAAC,eAAe,CAAC,MAAM,EAAE,QAAQ,EAAE,OAAO,CAAC,CAAC;QAChD,IAAI,IAAI,CAAC,IAAI;YAAE,IAAI,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC;QAE7C,IAAI,CAAC,EAAE,GAAG,MAAM,CAAC,EAAE,CAAC;QACpB,IAAI,CAAC,YAAY,GAAG,MAAM,CAAC,IAAI,CAAC;QAEhC,IAAI,CAAC,eAAe,EAAE,CAAC;IACzB,CAAC;IAEM,UAAU;QACf,OAAO;YACL,EAAE,EAAE,IAAI,CAAC,EAAE;YACX,YAAY,EAAE,IAAI,CAAC,YAAY;SAChC,CAAC;IACJ,CAAC;IAEO,SAAS;QACf,MAAM,EACJ,OAAO,EACP,gBAAgB,EAChB,kBAAkB,EAClB,cAAc,EACd,OAAO,EACP,IAAI,EACJ,kBAAkB,EAClB,GAAG,KAAK,EACT,GAAG,IAAI,CAAC,IAAI,CAAC;QAEd,MAAM,UAAU,GAAG,kBAAkB,IAAI,MAAM,CAAC,WAAW,CAAA,GAAG,IAAI,CAAC,IAAI,UAAU,IAAI,CAAC,kBAAkB,EAAE,CAAC,KAAK,EAAE,CAAC;QACnH,MAAM,QAAQ,GAAG,IAAI,CAAC,cAAc,EAAE,CAAC;QACvC,MAAM,aAAa,GAAG,gBAAgB,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;QAE9F,MAAM,MAAM,GAAG,IAAI,GAAG,CAAC,MAAM,CAC3B,IAAI,CAAC,IAAI,EACT;YACE,GAAG,KAAK;YACR,GAAG,OAAO;YACV,OAAO,EAAE,IAAI,CAAC,IAAI,CAAC,OAAO,IAAI,MAAM;YACpC,iBAAiB,EAAE,KAAK;YAExB,QAAQ,EAAE;gBACR,IAAI,EAAE,kBAAkB,CAAC,CAAC,CAAC,GAAG,CAAC,YAAY,CAAC,2BAA2B,CAAC,CAAC,CAAC,GAAG,CAAC,YAAY,CAAC,cAAc;gBACzG,sBAAsB,EAAE,kBAAkB,CAAC,CAAC,CAAC,CAAC,kBAAkB,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,SAAS;aACjF;YAED,6BAA6B,EAAE,kBAAkB,EAAE,EAAE;YACrD,kBAAkB,EAAE,UAAU;YAC9B,0BAA0B,EAAE,QAAQ,CAAC,KAAK;YAC1C,KAAK,EAAE,aAAa,EAAE,EAAE;YAExB,cAAc,EAAE,cAAc;gBAC5B,CAAC,CAAC;oBACE,iBAAiB,EAAE,cAAc,CAAC,UAAU,EAAE,QAAQ;wBACpD,CAAC,CAAC,GAAG,CAAC,iBAAiB,CAAC,eAAe;wBACvC,CAAC,CAAC,SAAS;oBACb,yBAAyB,EAAE,cAAc,CAAC,UAAU,EAAE,QAAQ;wBAC5D,CAAC,CAAC,cAAc,CAAC,yBAAyB,IAAI,IAAI;wBAClD,CAAC,CAAC,KAAK;oBAET,aAAa,EAAE,GAAG,CAAC,aAAa,CAAC,KAAK;oBACtC,QAAQ,EAAE,kBAAQ,CAAC,QAAQ;oBAC3B,GAAG,EAAE,cAAc,CAAC,UAAU,EAAE,QAAQ;oBACxC,KAAK,EAAE,cAAc,CAAC,UAAU,EAAE,WAAW;iBAC9C;gBACH,CAAC,CAAC,SAAS;YAEb,mBAAmB,EAAE,OAAO,EAAE,WAAW;gBACvC,CAAC,CAAC,GAAG,CAAC,uBAAuB,CAAC,QAAQ;gBACtC,CAAC,CAAC,GAAG,CAAC,uBAAuB,CAAC,OAAO;SACxC,EACD;YACE,GAAG,IAAI,CAAC,IAAI;YACZ,OAAO,EAAE,IAAI,IAAI,IAAI,CAAC,IAAI,EAAE,OAAO;YACnC,SAAS,EAAE,IAAI,CAAC,IAAI,EAAE,SAAS,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,QAAQ;YAChE,MAAM,EAAE,IAAI;SACb,CACF,CAAC;QAEF,IAAI,CAAC,yBAAyB,CAAC,MAAM,EAAE,aAAa,CAAC,CAAC;QACtD,IAAI,CAAC,iBAAiB,CAAC,UAAU,EAAE,MAAM,CAAC,QAAQ,CAAC,CAAC;QAEpD,OAAO,EAAE,MAAM,EAAE,QAAQ,EAAE,CAAC;IAC9B,CAAC;IAEO,aAAa,CAAC,MAAkB;QACtC,MAAM,EAAE,OAAO,EAAE,OAAO,EAAE,GAAG,IAAI,CAAC,IAAI,CAAC;QACvC,IAAI,CAAC,OAAO;YAAE,OAAO;QAErB,qBAAqB;QACrB,IAAI,OAAO,CAAC,yBAAyB,EAAE,CAAC;YACtC,IAAI,GAAG,CAAC,YAAY,CAClB,GAAG,IAAI,CAAC,IAAI,wBAAwB,EACpC;gBACE,GAAG,OAAO;gBACV,4CAA4C;gBAC5C,UAAU,EAAE,MAAM,CAAC,IAAI;gBACvB,cAAc,EAAE,SAAS;gBACzB,YAAY,EAAE,iBAAiB;aAChC,EACD,EAAE,SAAS,EAAE,MAAM,EAAE,MAAM,EAAE,IAAI,EAAE,CACpC,CAAC;QACJ,CAAC;aAAM,IAAI,OAAO,CAAC,OAAO,EAAE,CAAC;YAC3B,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC,KAAK,CAAC,CAAC,GAAG,EAAE,EAAE,CAC3C,IAAA,0BAAgB,EAAC,GAAG,CAAC,CAAC,GAAG,CAAC,CAAC,EAAE,EAAE,CAAC,EAAE,EAAE;gBAClC,MAAM,CAAC,GAAG,GAAG,IAAI,CAAC,IAAI,WAAW,CAAC,EAAE,CAAC;gBACrC,OAAO,IAAI,GAAG,CAAC,YAAY,CACzB,CAAC,EACD;oBACE,GAAG,OAAO;oBACV,sBAAsB;oBACtB,UAAU,EAAE,MAAM,CAAC,IAAI;oBACvB,cAAc,EAAE,EAAE,CAAC,KAAK;oBACxB,YAAY,EAAE,EAAE,CAAC,GAAG;iBACrB,EACD,EAAE,SAAS,EAAE,MAAM,EAAE,MAAM,EAAE,IAAI,EAAE,CACpC,CAAC;YACJ,CAAC,CAAC,CACH,CAAC;QACJ,CAAC;QAED,gBAAgB;QAChB,IAAI,OAAO,CAAC,OAAO,EAAE,CAAC;YACpB,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC,KAAK,CAAC,CAAC,MAAM,EAAE,EAAE,CAC9C,MAAM,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE;gBACf,MAAM,OAAO,GAAG,IAAI,CAAC,WAAW,CAAC,mBAAmB,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC;gBAC3D,IAAI,GAAG,CAAC,kBAAkB,CACxB,GAAG,IAAI,CAAC,IAAI,QAAQ,OAAO,EAAE,EAC7B;oBACE,GAAG,OAAO;oBACV,UAAU,EAAE,MAAM,CAAC,IAAI;oBACvB,sBAAsB,EAAE,CAAC,CAAC,EAAE;oBAC5B,gCAAgC,EAAE,KAAK;iBACxC,EACD,EAAE,SAAS,EAAE,MAAM,EAAE,MAAM,EAAE,IAAI,EAAE,CACpC,CAAC;YACJ,CAAC,CAAC,CACH,CAAC;QACJ,CAAC;QAED,cAAc;QACd,IAAI,OAAO,CAAC,WAAW,EAAE,CAAC;YACxB,IAAI,IAAI,CAAC,eAAe,CACtB,IAAI,CAAC,IAAI,EACT;gBACE,GAAG,OAAO,CAAC,WAAW;gBACtB,OAAO;gBACP,IAAI,EAAE,WAAW;gBACjB,YAAY,EAAE,MAAM;aACrB,EACD,EAAE,SAAS,EAAE,MAAM,EAAE,MAAM,EAAE,IAAI,EAAE,CACpC,CAAC;QACJ,CAAC;IACH,CAAC;IAEO,iBAAiB,CAAC,MAAkB;QAC1C,MAAM,EAAE,OAAO,EAAE,WAAW,EAAE,GAAG,IAAI,CAAC,IAAI,CAAC;QAC3C,IAAI,CAAC,WAAW;YAAE,OAAO,SAAS,CAAC;QAEnC,OAAO,IAAI,GAAG,CAAC,WAAW,CACxB,GAAG,IAAI,CAAC,IAAI,cAAc,EAC1B;YACE,GAAG,WAAW;YACd,GAAG,OAAO;YACV,mEAAmE;YACnE,oBAAoB,EAAE,GAAG,CAAC,0BAA0B,CAAC,GAAG;YAExD,UAAU,EAAE,MAAM,CAAC,IAAI;YACvB,YAAY,EAAE,WAAW,CAAC,SAAS,CAAC,CAAC,CAAC,WAAW,CAAC,SAAS,GAAG,IAAI,GAAG,IAAI,GAAG,IAAI,CAAC,CAAC,CAAC,SAAS;SAC7F,EACD,EAAE,SAAS,EAAE,MAAM,EAAE,MAAM,EAAE,IAAI,EAAE,CACpC,CAAC;IACJ,CAAC;IAEO,yBAAyB,CAAC,MAAkB,EAAE,GAAoC;QACxF,IAAI,CAAC,GAAG;YAAE,OAAO,SAAS,CAAC;QAC3B,MAAM,EAAE,OAAO,EAAE,SAAS,EAAE,GAAG,IAAI,CAAC,IAAI,CAAC;QACzC,4EAA4E;QAC5E,MAAM,OAAO,GAAG,MAAM,CAAC,WAAW,CAAA,GAAG,SAAU,CAAC,YAAY,IAAI,GAAG,CAAC,OAAO,IAAI,GAAG,CAAC,OAAO,EAAE,CAAC;QAC7F,wCAAwC;QACxC,uCAAuC;QACvC,4BAA4B;QAC5B,MAAM;QACN,kDAAkD;QAClD,2BAA2B;QAC3B,sDAAsD;QACtD,eAAe;QACf,2BAA2B;QAC3B,OAAO;QACP,oDAAoD;QACpD,KAAK;QAEL,gCAAgC;QAChC,OAAO,IAAI,GAAG,CAAC,mBAAmB,CAChC,GAAG,IAAI,CAAC,IAAI,sBAAsB,EAClC;YACE,uBAAuB,EAAE,SAAS;YAClC,iBAAiB,EAAE,OAAO,CAAC,iBAAiB;YAC5C,UAAU,EAAE,MAAM,CAAC,IAAI;YACvB,aAAa,EAAE,GAAG,CAAC,aAAa,CAAC,aAAa;YAC9C,aAAa,EAAE,OAAO,EAAE,iBAAiB;YACzC,mBAAmB,EAAE,IAAI;SAC1B,EACD,EAAE,SAAS,EAAE,MAAM,EAAE,MAAM,EAAE,IAAI,EAAE,CACpC,CAAC;IACJ,CAAC;IAEO,6BAA6B,CAAC,MAAkB;QACtD,MAAM,EAAE,OAAO,EAAE,uBAAuB,EAAE,SAAS,EAAE,GAAG,IAAI,CAAC,IAAI,CAAC;QAClE,IAAI,CAAC,uBAAuB;YAAE,OAAO,SAAS,CAAC;QAC/C,2EAA2E;QAC3E,IAAI,CAAC,iBAAiB,CAAC,aAAa,EAAE,MAAM,CAAC,QAAQ,CAAC,CAAC;QAEvD,MAAM,YAAY,GAAG,wBAAc,CAAC,0BAA0B,CAAC,uBAAuB,CAAC,UAAU,CAAC,CAAC;QACnG,MAAM,UAAU,GAAG,IAAA,oCAA0B,EAAC,uBAAuB,CAAC,UAAU,EAAE,SAAS,CAAC,CAAC;QAE7F,MAAM,KAAK,GAAG,IAAI,GAAG,CAAC,yBAAyB,CAC7C,GAAG,IAAI,CAAC,IAAI,QAAQ,EACpB;YACE,GAAG,OAAO;YACV,uBAAuB,EAAE,SAAS;YAClC,UAAU,EAAE,MAAM,CAAC,IAAI;YACvB,kBAAkB,EAAE,IAAI;YACxB,cAAc,EAAE,uBAAuB,CAAC,WAAW;YACnD,aAAa,EAAE,uBAAuB,CAAC,aAAa,IAAI,kBAAQ,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC;YAE/E,uBAAuB,EAAE,UAAU;YACnC,eAAe,EAAE,YAAY,CAAC,IAAI;YAClC,KAAK,EAAE,SAAS;SACjB,EACD,EAAE,SAAS,EAAE,MAAM,EAAE,MAAM,EAAE,IAAI,EAAE,CACpC,CAAC;QAEF,cAAc;QACd,IAAI,GAAG,CAAC,gCAAgC,CACtC,GAAG,IAAI,CAAC,IAAI,QAAQ,EACpB;YACE,GAAG,OAAO;YACV,qBAAqB,EAAE;gBACrB,0CAA0C;gBAC1C,sCAAsC;gBACtC,uBAAuB;aACxB;YACD,UAAU,EAAE,MAAM,CAAC,IAAI;YACvB,sBAAsB,EAAE,SAAS;YACjC,2BAA2B,EAAE,IAAI;YACjC,0BAA0B,EAAE,KAAK;YACjC,mBAAmB,EAAE,+BAA+B;YACpD,YAAY,EAAE,IAAI;YAClB,aAAa,EAAE,uBAAuB,CAAC,aAAa,IAAI,kBAAQ,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC;YAC/E,KAAK,EAAE,SAAS;YAChB,oBAAoB,EAAE,IAAI;YAE1B,uBAAuB,EAAE,UAAU;YACnC,4BAA4B,EAAE,kBAAQ,CAAC,cAAc;YACrD,eAAe,EAAE,YAAY,CAAC,IAAI;SACnC,EACD,EAAE,SAAS,EAAE,KAAK,EAAE,MAAM,EAAE,IAAI,EAAE,CACnC,CAAC;QAEF,+BAA+B;QAC/B,IAAI,GAAG,CAAC,6BAA6B,CACnC,GAAG,IAAI,CAAC,IAAI,aAAa,EACzB;YACE,GAAG,OAAO;YACV,2BAA2B,EAAE,IAAI,CAAC,IAAI;YACtC,UAAU,EAAE,MAAM,CAAC,IAAI;YAEvB,cAAc,EAAE;gBACd,SAAS,EAAE,IAAI;gBACf,uBAAuB,EAAE,IAAI;gBAC7B,MAAM,EAAE,uBAAuB,CAAC,WAAW;aAC5C;YAED,oBAAoB,EAAE,MAAM,CAAC,WAAW,CAAA,GAAG,YAAY,CAAC,IAAI,IAAI,MAAM,CAAC,IAAI,EAAE;YAC7E,uBAAuB,EAAE,UAAU;SACpC,EACD,EAAE,SAAS,EAAE,KAAK,EAAE,MAAM,EAAE,IAAI,EAAE,CACnC,CAAC;IACJ,CAAC;IAEO,eAAe,CAAC,MAAkB,EAAE,QAAwB,EAAE,WAA6B;QACjG,MAAM,EAAE,OAAO,EAAE,SAAS,EAAE,cAAc,EAAE,kBAAkB,EAAE,GAAG,IAAI,CAAC,IAAI,CAAC;QAC7E,IAAI,CAAC,SAAS;YAAE,OAAO,SAAS,CAAC;QAEjC,OAAO,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE;YACtC,MAAM,KAAK,GAAG,SAAS,CAAC,CAAC,CAAC,CAAC;YAC3B,MAAM,IAAI,GAAG,KAAK,CAAC,YAAY,IAAI,CAAC,CAAC;YAErC,MAAM,EAAE,GAAG,IAAI,GAAG,CAAC,QAAQ,CACzB,GAAG,IAAI,CAAC,IAAI,IAAI,IAAI,EAAE,EACtB;gBACE,GAAG,KAAK;gBACR,GAAG,OAAO;gBACV,mEAAmE;gBACnE,oBAAoB,EAAE,GAAG,CAAC,0BAA0B,CAAC,GAAG;gBAExD,aAAa,EAAE,WAAW,EAAE,EAAE;gBAC9B,GAAG,EAAE,WAAW,EAAE,EAAE,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG;gBAC5C,UAAU,EAAE,MAAM,CAAC,IAAI;gBACvB,YAAY,EAAE,IAAI;aACnB,EACD,EAAE,SAAS,EAAE,WAAW,CAAC,CAAC,CAAC,CAAC,MAAM,EAAE,QAAQ,EAAE,WAAW,CAAC,CAAC,CAAC,CAAC,CAAC,MAAM,EAAE,QAAQ,CAAC,EAAE,MAAM,EAAE,IAAI,EAAE,CAChG,CAAC;YAEF,MAAM,gBAAgB,GAAG,cAAc,EAAE,yBAAyB;gBAChE,CAAC,CAAC,cAAc,EAAE,kCAAkC;oBAClD,CAAC,CAAC,MAAM,CAAC,WAAW,CAAA,cAAc,MAAM,CAAC,IAAI,+CAA+C,EAAE,CAAC,IAAI,iEAAiE,kBAAkB,EAAE,WAAW,sGAAsG;oBACzS,CAAC,CAAC,MAAM,CAAC,WAAW,CAAA,cAAc,MAAM,CAAC,IAAI,+CAA+C,EAAE,CAAC,IAAI,gJAAgJ;gBACrP,CAAC,CAAC,MAAM,CAAC,WAAW,CAAA,cAAc,MAAM,CAAC,IAAI,+CAA+C,EAAE,CAAC,IAAI,aAAa,MAAM,CAAC,kBAAkB,cAAc,QAAQ,CAAC,KAAK,sGAAsG,CAAC;YAE9Q,IAAI,CAAC,SAAS,CAAC,GAAG,IAAI,OAAO,EAAE,gBAAgB,CAAC,CAAC;YACjD,OAAO,EAAE,CAAC;QACZ,CAAC,CAAC,CAAC;IACL,CAAC;CACF;AAtUD,sBAsUC"}
@@ -0,0 +1,35 @@
1
+ import * as mysql from '@pulumi/azure-native/dbformysql';
2
+ import * as pulumi from '@pulumi/pulumi';
3
+ import { BaseArgs, BaseResourceComponent } from '../base';
4
+ import * as types from '../types';
5
+ export interface MySqlArgs extends BaseArgs, types.WithEncryptionEnabler, types.WithResourceGroupInputs, types.WithGroupRolesArgs, types.WithUserAssignedIdentity, types.WithNetworkArgs, Pick<mysql.ServerArgs, 'version' | 'storage' | 'administratorLogin' | 'maintenanceWindow' | 'backup' | 'highAvailability' | 'availabilityZone'> {
6
+ sku: {
7
+ /**
8
+ * The name of the sku, e.g. Standard_D32s_v3.
9
+ */
10
+ name: pulumi.Input<string>;
11
+ /**
12
+ * The tier of the particular SKU, e.g. GeneralPurpose.
13
+ */
14
+ tier: mysql.ServerSkuTier;
15
+ };
16
+ enableAzureADAdmin?: boolean;
17
+ databases?: Array<{
18
+ name: string;
19
+ }>;
20
+ lock?: boolean;
21
+ }
22
+ export declare class MySql extends BaseResourceComponent<MySqlArgs> {
23
+ readonly id: pulumi.Output<string>;
24
+ readonly resourceName: pulumi.Output<string>;
25
+ constructor(name: string, args: MySqlArgs, opts?: pulumi.ComponentResourceOptions);
26
+ getOutputs(): {
27
+ id: pulumi.Output<string>;
28
+ resourceName: pulumi.Output<string>;
29
+ };
30
+ private createMySql;
31
+ private createNetwork;
32
+ private enableADAdmin;
33
+ private createDatabases;
34
+ private getUAssignedId;
35
+ }